skip to main content
10.1145/2389176.2389208acmconferencesArticle/Chapter ViewAbstractPublication PagesgroupConference Proceedingsconference-collections
research-article

From credit and risk to trust: towards a credit flow based trust model for social networks

Published:27 October 2012Publication History

ABSTRACT

Trust management is a paramount issue in social networks. Existing models based on global reputation are simplistic as they do not support personalised measures for individual users. Models based on local trust propagation tend to be too subjective to be reliable as they do not consider a social network in its entirety. More importantly, neither model has taken the risk factor into the consideration of trust management. In this paper, we contribute a novel trust model that allows personalised measures to be naturally established on objective grounds through tracing credit flows within a social network, where the trust between a pair of users can be derived from the credit flowing from one into the other and the relative risk disparity between them. This model uses power flows in an electrical grid as a metaphor for the credit flows in a social network and is based on the hypothesis that the credit flows in a social network are similar in nature to the power flows in an electrical grid. Experiments with a real-world dataset have proved the hypothesis and the results have shown that the credit flow based trust model can derive not only personalised but also more accurate trust measures than existing models do.

References

  1. J. Golbeck. Computing and Applying Trust in Web-based Social Networks. PhD thesis, University of Maryland, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Guha. Open rating systems. Technical report, Stanford University, 2003.Google ScholarGoogle Scholar
  3. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web, pages 403--412, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Jøsang. An algebra for assessing trust in certification chains. In Proceeedings of the Network and Distributed Systems Security Symposium, 1999.Google ScholarGoogle Scholar
  5. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web, pages 640--651, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Kwon, J. Cho, and Y. Park. Multidimensional credibility model for neighbor selection in collaborative recommendation. Expert Systems with Applications, 36(3):7114--7122, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Levien. Advogato Trust Metric. PhD thesis, UC Berkeley, 2003.Google ScholarGoogle Scholar
  8. G. Liu, Y. Wang, and M. Orgun. Trust inference in complex trust-oriented social networks. In Proceedings of the 2009 International Conference on Computational Science and Engineering, pages 996--1001, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Liu, A. Datta, K. Rzadca, and E. Lim. Stereotrust: a group based personalized trust model. In Proceedings of ACM International Conference on Information and Knowledge Management, pages 7--16, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Mao, H. Shen, and C. Sun. Supporting exploratory information seeking by epistemology-based social search. In Proceedings of the 15th ACM Conference on Intelligent User Interfaces (IUI'10), pages 36--39, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Massa and P. Avesani. Controversial users demand local trust metrics: An experimental study on epinions.com community. In Proceedings of the 20th National Conference on Artificial Intelligence, pages 121--126, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web. Technical report, Stanford University, 1999.Google ScholarGoogle Scholar
  13. A. G. Phadke and J. S. Thorp. Computer relaying for power systems. John Wiley & Sons, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Richardson, R. Agrawa, and P. Domingos. Trust management for the semantic web. In Proceedings of International Semantic Web Conference, pages 351--368, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 61--70, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Saadat. Power System Analysis, 2nd Edition. McGraw-Hill, 2002.Google ScholarGoogle Scholar
  17. K. Sankaralingam, S. Sethumadhavan, and J. Browne. Distributed pagerank for p2p systems. In Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing, pages 58--68, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  19. J. Surowiecki. The wisdom of crowds: why the many are smarter than the few and how collective wisdom shapes business, economies, societies and nations. Little, Brown & Company, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Victor, C. Cornelis, M. de Cock, and P. P. da Silva. Gradual trust and distrust in recommender systems. Fuzzy Sets and Systems, 160(10):1367--1382, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440--442, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  22. L. Xiong and L. Liu. Peertrust: Supporting reputation-based trust for peer-to- peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7):843--857, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Yu and M. P. Singh. An evidential model of distributed reputation management. In Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, pages 294--301, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. Zhou and K. Hwang. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel Distributed Systems, 18(4):460--473, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Zhou, K. Hwang, and M. Cai. Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Transactions on Knowledge and Data Engineering, 20(9):1282--1295, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. C.-N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service, pages 83--97, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C.-N. Ziegler and G. Lausen. Propagation models for trust and distrust in social networks. Information Systems Frontiers, 7(4-5):337--358, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. From credit and risk to trust: towards a credit flow based trust model for social networks

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    GROUP '12: Proceedings of the 2012 ACM International Conference on Supporting Group Work
                    October 2012
                    342 pages
                    ISBN:9781450314862
                    DOI:10.1145/2389176

                    Copyright © 2012 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 27 October 2012

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article

                    Acceptance Rates

                    Overall Acceptance Rate125of405submissions,31%

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader